diff src/protocols/yahoo/crypt.c @ 10687:b256ce6b85b8

[gaim-migrate @ 12235] grim says this is really fixed this time. committer: Tailor Script <tailor@pidgin.im>
author Etan Reisner <pidgin@unreliablesource.net>
date Sat, 12 Mar 2005 01:10:37 +0000
parents 72a5babfa8b4
children 923b78741964
line wrap: on
line diff
--- a/src/protocols/yahoo/crypt.c	Fri Mar 11 22:45:41 2005 +0000
+++ b/src/protocols/yahoo/crypt.c	Sat Mar 12 01:10:37 2005 +0000
@@ -49,6 +49,7 @@
 	size_t salt_len;
 	size_t key_len;
 	size_t cnt;
+
 	char *cp;
 
 	if (buflen < needed) {
@@ -100,7 +101,7 @@
 	gaim_cipher_context_append(context2, key, key_len);
 
 	/* Now get result of this (16 bytes) and add it to the other context.  */
-	gaim_cipher_context_digest(context2, NULL, digest);
+	gaim_cipher_context_digest(context2, sizeof(digest), digest, NULL);
 
 	/* Add for any character in the key one byte of the alternate sum.  */
 	for (cnt = key_len; cnt > 16; cnt -= 16)
@@ -120,7 +121,7 @@
 								   (cnt & 1) != 0 ? digest : (guint8 *)key, 1);
 
 	/* Create intermediate result.  */
-	gaim_cipher_context_digest(context1, NULL, digest);
+	gaim_cipher_context_digest(context1, sizeof(digest), digest, NULL);
 
 	/* Now comes another weirdness.  In fear of password crackers here
 	 * comes a quite long loop which just processes the output of the
@@ -151,7 +152,7 @@
 			gaim_cipher_context_append(context2, key, key_len);
 
 		/* Create intermediate result.  */
-		gaim_cipher_context_digest(context2, NULL, digest);
+		gaim_cipher_context_digest(context2, sizeof(digest), digest, NULL);
 	}
 
 	/* Now we can construct the result string.  It consists of three parts. */
@@ -197,7 +198,7 @@
 	 * inside the MD5 implementation as well.
 	 */
 	gaim_cipher_context_reset(context1, NULL);
-	gaim_cipher_context_digest(context1, NULL, digest);
+	gaim_cipher_context_digest(context1, sizeof(digest), digest, NULL);
 	gaim_cipher_context_destroy(context1);
 	gaim_cipher_context_destroy(context2);